Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

GPSec Boston 2025 - CTEM: How to Start When You Haven't Started

What does it really take to start a Continuous Threat Exposure Management (CTEM) program—especially if your organization hasn’t formally begun? In this GPSec Boston 2025 session, Scott Kuffer, COO and Co-founder of Nucleus Security, joins Chris Peltz, Director of Security Strategy at GuidePoint Security, to demystify CTEM by stripping away the buzzwords and breaking down the practical steps for getting started.

Polymorphic Extensions - The 443 Podcast - Episode 323

This week on the podcast, we discuss a research post by SquareX that invents a new way to impersonate any extension installed on a victim's web browser. Before that, we cover the latest supply chain attack attempts from Lazarus, as well as a malvertising campaign that managed to infect 1 million endpoints. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Postman API Security Testing Tutorial

According to a recent study by OWASP, 70% of all web applications are vulnerable to security risks. API security testing is one of the most effective ways to mitigate these risks. Postman is a popular tool for API security testing, with over 10 million users worldwide. In today's digital world, APIs are the backbone of most applications. As a result, they are also a prime target for hackers. This is why it's important to perform security testing on your APIs to ensure that they are not vulnerable to attack.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

Traditional network vulnerability scanners leave your critical network assets vulnerable, providing outdated visibility and ineffective prioritization. Falcon Exposure Management's Network Vulnerability Assessment (NVA) delivers real-time visibility, AI-powered prioritization with ExPRT.AI, and seamless integration for automated remediation. This demo showcases how NVA streamlines your security strategy, ensuring precise focus on threats that matter most and proactively protecting your network.